CVE-2021-23239

Name
CVE-2021-23239
Description
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://www.sudo.ws/stable.html#1.9.5
Exploit https://bugzilla.suse.com/show_bug.cgi?id=CVE-2021-23239
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE42Y35SMJOLONAIBNYNFC7J44UUZ2Y6/
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMY4VSSBIND7VAYSN6T7XIWJRWG4GBB3/
Third Party Advisory https://security.gentoo.org/glsa/202101-33
Third Party Advisory https://security.netapp.com/advisory/ntap-20210129-0010/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* sudo >= None < 1.8.32
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* sudo >= 1.9.0 < 1.9.5

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
sudo 3.10-main 1.9.5p2-r0 Natanael Copa <ncopa@alpinelinux.org> fixed